Port No | 7626 |
Service Name | Backdoor.G_Door.b |
RFC Doc | 0 |
Protocol | TCP |
Description | This memory-resident backdoor arrives on a target system through the Web, downloaded programs, and/or manual installation. It has two components: the server and the client. The server component has the following capabilities: Listen to a default port, 7626, for commands issued by a remote user Enable the Autodisconnect and Autodial functions The Client component performs the following actions on the infected machine: Issue requests to the server component Allow the malicious user to perform the following operations: Search for target machines Grant full-access to the hard drives Send email Capture screenshot Get system information Configure the server component settings This UPX-compressed malware runs on Windows 95, 98, ME, NT, 2000, and XP. |
Reference Link | Backdoor.G_Door.b |
Attack | Solution: This procedure terminates the running malware process from memory. You will need the name(s) of the file(s) detected earlier. Open Windows Task Manager. On Windows 95/98/ME systems, press CTRL+ALT+DELETE On Windows NT/2000/XP systems, press CTRL+SHIFT+ESC, then click the Processes tab. In the list of running programs*, locate the malware file or files detected earlier. Select one of the detected files, then press either the End Task or the End Process button, depending on the version of Windows on your system. Do the same for all detected malware files in the list of running processes. To check if the malware process has been terminated, close Task Manager, and then open it again. Close Task Manager. *NOTE: On systems running Windows 95/98/ME, Task Manager may not show certain processes. You may use a third party process viewer to terminate the malware process. Otherwise, continue with the next procedure, noting additional instructions |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.